Search Results - (( form detection a algorithm ) OR ( botnet detection system algorithm ))
Search alternatives:
- system algorithm »
- form detection »
- detection a »
- a algorithm »
-
1
-
2
A new mobile botnet classification based on permission and API calls
Published 2024Subjects:Conference Paper -
3
Systematic analysis on mobile botnet detection techniques using genetic algorithm
Published 2024Subjects:Conference Paper -
4
Botnet Detection Using a Feed-Forward Backpropagation Artificial Neural Network
Published 2019“…The proposed technique aims to detect Botnet zero-day attack in real time. This technique applies a backpropagation algorithm to the CTU-13 dataset to train and evaluate the Botnet detection classifier. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Botnet detection using automated script / Norfathin Rosli
Published 2020“…This paper is about a Botnet Detection using Automated Script, the programming language is and the operating system is Windows 7. …”
Get full text
Get full text
Thesis -
6
-
7
A behavior based algorithm to detect spam bots
Published 2009“…Spamming causes illegal consuming of network resources in general and mail system in particular. The objective of this research is to detect the source of spam on the network by detecting the abnormal behaviors that reflect spamming activities. …”
Get full text
Get full text
Thesis -
8
An enhanced android botnet detection approach using feature refinement
Published 2019“…In order to detect botnet attacks which causes immense chaos and problems to smartphones, first the Android botnet need to be analysed. …”
Get full text
Get full text
Thesis -
9
A Static Approach towards Mobile Botnet Detection
Published 2016“…In this study we propose a static approach towards mobile botnet detection. This technique combines MD5, permissions, broadcast receivers as well as background services and uses machine learning algorithm to detect those applications that have capabilities for mobile botnets. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
IoT-based botnet attacks systematic mapping study of literature
Published 2024journal::journal article -
11
Designing a new model for Trojan horse detection using sequential minimal optimization
Published 2024Conference Paper -
12
Automated System for Detecting Cyber Bot Attacks in 5G Networks using Machine Learning
Published 2024“…Botnets are compromised computer networks controlled by attackers that are visible for this reason. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Android mobile malware detection model based on permission features using machine learning approach
Published 2022“…Different techniques have been adopted to detect and prevent the spread of Android malware, including anomaly, signature-based, and hybrid detection techniques. …”
Get full text
Get full text
Thesis -
14
Temporal video segmentation using squared form of Krawtchouk-Tchebichef moments
Published 2018“…In the first part of the proposed algorithm, unique moments coefficients (features) are extracted using a new hybrid set of orthogonal polynomials which is derived based on the modified forms of Krawtchouk and a Tchebichef polynomials. …”
Get full text
Get full text
Get full text
Thesis -
15
GuitarApprentice: A Mobile Application for Acoustic Guitar Learning using Fast Fourier Transform algorithm
Published 2013“…The application also aims to select the best algorithm to detect chords and display the chords detection in pictorial form for easier understanding. …”
Get full text
Get full text
Final Year Project -
16
A Detection Method for Text Steganalysis Using Evolution Algorithm (EA) Approach
Published 2012“…Much of the technical steganalysis work had been carried out on image, video, and audio steganalysis, but in any agency or organisation, all business documents generally uses the natural language in text form or document form. Therefore, this research employed a detection factor based on the evolution algorithm method for text steganalysis. …”
Get full text
Get full text
Get full text
Thesis -
17
The fusion of edge detection and mathematical morphology algorithm for shape boundary recognition
Published 2016“…To address this problem, this paper proposes a fusion of selected edge detection algorithms with mathematical morphology to enhance the ability to detect the object shape boundary. …”
Get full text
Get full text
Get full text
Article -
18
Prevention of Textual Plagiarism Application
Published 2011“…Thus, the main focus of this project is to perform a study on how to detect textual plagiarism. Word -for- word plagiarism is the most noticeable and serious form of plagiarism. …”
Get full text
Get full text
Final Year Project -
19
Real time power quality event detection using continuous wavelet transform
Published 2023Conference paper -
20
Modified damage location indices in beam-like structure: Analytical study
Published 2011“…The proposed modified forms of the algorithms exhibited better sensitivity for detecting damage location in addition to the anomalies at the supports being eliminated. …”
Get full text
Get full text
Article
